咨询与建议

限定检索结果

文献类型

  • 3,306 篇 会议
  • 2,000 篇 期刊文献
  • 19 册 图书

馆藏范围

  • 5,325 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,292 篇 工学
    • 2,285 篇 计算机科学与技术...
    • 1,844 篇 软件工程
    • 716 篇 信息与通信工程
    • 525 篇 控制科学与工程
    • 345 篇 电子科学与技术(可...
    • 328 篇 电气工程
    • 321 篇 生物工程
    • 291 篇 机械工程
    • 208 篇 仪器科学与技术
    • 207 篇 生物医学工程(可授...
    • 195 篇 光学工程
    • 163 篇 化学工程与技术
    • 130 篇 动力工程及工程热...
    • 122 篇 交通运输工程
    • 104 篇 安全科学与工程
    • 99 篇 材料科学与工程(可...
    • 93 篇 网络空间安全
  • 1,767 篇 理学
    • 913 篇 数学
    • 494 篇 物理学
    • 355 篇 生物学
    • 296 篇 统计学(可授理学、...
    • 213 篇 系统科学
    • 170 篇 化学
  • 938 篇 管理学
    • 573 篇 管理科学与工程(可...
    • 405 篇 图书情报与档案管...
    • 230 篇 工商管理
  • 221 篇 医学
    • 185 篇 临床医学
    • 146 篇 基础医学(可授医学...
  • 148 篇 法学
    • 121 篇 社会学
  • 101 篇 经济学
    • 100 篇 应用经济学
  • 64 篇 农学
  • 61 篇 教育学
  • 21 篇 文学
  • 16 篇 艺术学
  • 15 篇 军事学

主题

  • 130 篇 feature extracti...
  • 129 篇 deep learning
  • 102 篇 accuracy
  • 88 篇 computer science
  • 87 篇 training
  • 86 篇 computational mo...
  • 86 篇 semantics
  • 78 篇 machine learning
  • 76 篇 optimization
  • 73 篇 data mining
  • 60 篇 predictive model...
  • 55 篇 internet of thin...
  • 52 篇 support vector m...
  • 51 篇 information syst...
  • 51 篇 neural networks
  • 50 篇 security
  • 50 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 testing
  • 47 篇 genetic algorith...

机构

  • 182 篇 hubei province k...
  • 128 篇 school of comput...
  • 109 篇 college of compu...
  • 98 篇 department of co...
  • 58 篇 college of infor...
  • 54 篇 hubei province k...
  • 54 篇 school of softwa...
  • 45 篇 tsinghua nationa...
  • 45 篇 national key lab...
  • 42 篇 school of comput...
  • 41 篇 the key laborato...
  • 41 篇 national enginee...
  • 37 篇 department of co...
  • 36 篇 school of inform...
  • 31 篇 college of infor...
  • 30 篇 shandong provinc...
  • 27 篇 university of ch...
  • 25 篇 key laboratory f...
  • 21 篇 college of compu...
  • 20 篇 key laboratory f...

作者

  • 27 篇 ren jiadong
  • 23 篇 shen linlin
  • 22 篇 liu jun
  • 21 篇 abdelwahed motwa...
  • 21 篇 zhang xiaolong
  • 21 篇 gaol ford lumban
  • 20 篇 li peng
  • 19 篇 dan feng
  • 19 篇 ishfaq yaseen
  • 19 篇 mesfer al duhayy...
  • 18 篇 mohamed k.nour
  • 18 篇 xiaolong zhang
  • 18 篇 jin hai
  • 17 篇 manar ahmed hamz...
  • 17 篇 zhang kai
  • 16 篇 matsuo tokuro
  • 16 篇 hai jin
  • 15 篇 liu zhe
  • 15 篇 wei hu
  • 15 篇 wang wei

语言

  • 5,059 篇 英文
  • 141 篇 其他
  • 124 篇 中文
  • 6 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
检索条件"机构=Computer System and Information Technology"
5325 条 记 录,以下是281-290 订阅
排序:
BAV-DSS: Blockchain Assisted Verifiable Data Sharing Scheme with Fast Encryption and Outsourced Decryption for IoT  24th
BAV-DSS: Blockchain Assisted Verifiable Data Sharing Scheme ...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Huang, Yao Yu, Zhongyuan Wang, Guijuan Chai, Baobao Zhang, Hongliang Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan250353 China School of Information Science and Engineering Lanzhou University Lanzhou730000 China School of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China
Many sophisticated cloud platforms are available to provide services such as storage and computation for Internet of Things (IoT) applications. However, with the concerns about the semi-trusted nature of cloud platfor... 详细信息
来源: 评论
N-gram and Word2Vec Feature Engineering Approaches for Spam Recognition on Some Influential Twitter Topics in Saudi Arabia  22
N-gram and Word2Vec Feature Engineering Approaches for Spam ...
收藏 引用
6th International Conference on information system and Data Mining, ICISDM 2022
作者: Balfagih, Ahmed Keselj, Vlado Taylor, Stacey Faculty of Computer Science Dalhousie University Canada Information System Faculty of Computing and Information Technology King Abdulaziz University Saudi Arabia
Social media platforms, such as Twitter, have become powerful sources of information on people's perception of major events. Many people use Twitter to express their views on various issues and events and use it t... 详细信息
来源: 评论
Optimized Evaluation of Mobile Base Station by Modern Topological Invariants
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 363-378页
作者: Khalid Hamid Muhammad Waseem Iqbal Muhammad Usman Ashraf Ahmed Mohammed Alghamdi Adel A.Bahaddad Khalid Ali Almarhabi Department of Computer Science Superior UniversityLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Computer Science GC Women UniversitySialkot53310Pakistan Department of Software Engineering College of Computer Science and EngineeringUniversity of Jeddah21493Saudi Arabia Department of Information System Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science College of Computing in Al-QunfudahUmm Al-Qura UniversityMakkah24381Saudi Arabia
Due to a tremendous increase in mobile traffic,mobile operators have started to restructure their networks to offload their *** directions will lead to fundamental changes in the design of future Fifthgeneration(5G)ce... 详细信息
来源: 评论
Range-angle Imaging Based on the Prior of Target Scattering Characteristics in Distributed Arrays  2
Range-angle Imaging Based on the Prior of Target Scattering ...
收藏 引用
2nd IEEE International Conference on Signal, information and Data Processing, ICSIDP 2024
作者: Mei, Yongjie Zhang, Guangbin Huang, Tianyao Wang, Yan Beijng Institute of Technology School of Information and Electronics Beijing China Yangtze Delta Region Academy Beijing Institute of Technology Radar System and Intelligent Signal Processing Jiaxing China University of Science and Technology Beijing School of Computer and Communication Engineering Beijing China
We consider the problem of target range-angle imaging using distributed arrays. High resolution imaging requires a large array aperture. However, due to the limited number of array elements, the subarrays are usually ... 详细信息
来源: 评论
Semantic-based Attention model for Hospital Readmission Prediction
Semantic-based Attention model for Hospital Readmission Pred...
收藏 引用
2022 IEEE International Conference on Big Data, Big Data 2022
作者: Im, Sea Jung Xu, Yue Watson, Jason Queensland University of Technology School of Computer Science Brisbane Australia Queensland University of Technology School of Information System Brisbane Australia
Unexpected hospital readmissions are problematic to both hospitals and patients, and also costly in terms of money and resources as well. Thus, identifying whether or not a patient will be readmitted becomes an import... 详细信息
来源: 评论
Fine classification of rice paddy using multitemporal compact polarimetric SAR C band data based on machine learning methods
收藏 引用
Frontiers of Earth Science 2024年 第1期18卷 30-43页
作者: Xianyu GUO Junjun YIN Kun LI Jian YANG Huimin ZOU Fukun YANG School of Computer and Communication Engineering University of Science and Technology BeijingBeijing 100083China Aerospace Information Research Institute Chinese Academy of SciencesBeijing 100094China Department of Electronic Engineering Tsinghua UniversityBeijing 100084China College of Global Change and Earth System Science Beijing Normal UniversityBeijing 100875China
Rice is an important food crop for human *** distinguishing different varieties and sowing methods of rice on a large scale can provide more accurate information for rice growth monitoring,yield estimation,and phenolo... 详细信息
来源: 评论
Utilizing Genetic Algorithms for Detecting Congenital Heart Defects
Utilizing Genetic Algorithms for Detecting Congenital Heart ...
收藏 引用
2024 International Conference on E-Mobility, Power Control and Smart systems, ICEMPS 2024
作者: Patil, Sachin C. Kasula, Balaram Yadav Mohammed, Vazeer Ali Gupta, Ketan Thamaraimanalan, T. United States University of The Cumberlands Dept of Information Technology WilliamsburgKY United States Lewis University Dept. of Computer & Information System IL United States Sri Eshwar College of Engineering Department of Ece Tamil Nadu Coimbatore India
Genetic Algorithms have been more and more employed to stumble on congenital heart defects in the last variety of years. Gasoline is a computational technique that uses evolutionary concepts to optimize answers to com... 详细信息
来源: 评论
Code Vulnerability Detection via Nearest Neighbor Mechanism
Code Vulnerability Detection via Nearest Neighbor Mechanism
收藏 引用
2022 Findings of the Association for Computational Linguistics: EMNLP 2022
作者: Du, Qianjin Kuang, Xiaohui Zhao, Gang Department of Computer Science and Technology Tsinghua University China National Key Laboratory of Science and Technology on Information System Security China
Code vulnerability detection is a fundamental and challenging task in the software security field. Existing research works aim to learn semantic information from the source code by utilizing NLP technologies. However,... 详细信息
来源: 评论
An Efficient Schema Transformation Technique for Data Migration from Relational to Column-Oriented Databases
收藏 引用
computer systems Science & Engineering 2022年 第12期43卷 1175-1188页
作者: Norwini Zaidi Iskandar Ishak Fatimah Sidi Lilly Suriani Affendey System Development and Engineering Center Universiti Sains Islam Malaysia71800Negeri SembilanMalaysia Faculty of Computer Science and Information Technology Universiti Putra MalaysiaUPM Serdang43400SelangorMalaysia
Data transformation is the core process in migrating database from relational database to NoSQL database such as column-oriented database. However,there is no standard guideline for data transformation from relationa... 详细信息
来源: 评论
Continual Learning with a Memory of Non-similar Samples  1
收藏 引用
17th International Conference on Bio-Inspired Computing: Theories and Applications, BIC-TA 2022
作者: Min, Qilang He, Juanjuan Yang, Liuyan Fu, Yue College of Computer Science and Technology Wuhan University of Science and Technology Wuhan430081 China Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System Wuhan China
The replay method is an effective strategy to address the problem of catastrophic forgetting, a key challenge for continuous learning. However, the sample sets obtained by replay-based methods generally suffer from lo... 详细信息
来源: 评论